Login / Signup

) using parallel multipliers and architectures.

Qasem Abu Al-HaijaAhmad Al Badawi
Published in: Int. J. Inf. Comput. Secur. (2013)
Keyphrases